CN102750465A - Information privacy system and method - Google Patents

Information privacy system and method Download PDF

Info

Publication number
CN102750465A
CN102750465A CN2012100764425A CN201210076442A CN102750465A CN 102750465 A CN102750465 A CN 102750465A CN 2012100764425 A CN2012100764425 A CN 2012100764425A CN 201210076442 A CN201210076442 A CN 201210076442A CN 102750465 A CN102750465 A CN 102750465A
Authority
CN
China
Prior art keywords
equipment
data
program
individual
privacy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012100764425A
Other languages
Chinese (zh)
Other versions
CN102750465B (en
Inventor
A·M·梅巴德
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of CN102750465A publication Critical patent/CN102750465A/en
Application granted granted Critical
Publication of CN102750465B publication Critical patent/CN102750465B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • G06F21/35User authentication involving the use of external additional devices, e.g. dongles or smart cards communicating wirelessly
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/40User authentication by quorum, i.e. whereby two or more security principals are required
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS

Abstract

The subject disclosure relates to systems and methods for providing privacy for information. In one non-limiting embodiment, a system includes an environment monitoring component configured to monitor an aspect of an environment; and a privacy component configured to: determine whether factors associated with the environment are triggered; and obscure access or provide access to data or a program associated with the factors based on determining that the factors are triggered. Factors can be based on the time and the location or network connectivity of a device associated with the system, the detected presence or absence of an authorized person other than the user logged into the device or the privacy state of the user logged into the device. Motion detectors, cameras, biometric sensors and other devices can be employed in the determination of whether to provide or obscure access to the information.

Description

The information privacy system and method
Technical field
The present invention relates generally to be used to provide the system and method for information privacy.
Background technology
Conventional equipment and system adopt only cryptoguard usually, allow or stop can or being stored in the visit of data, program and/or equipment on the equipment by a device access.Cryptoguard walked around or situation about confirming in, can obtain unauthorized access to sensitive information.In addition, suitably visit in the situation of going to and being intercepted and captured, the possibility of the unauthorized access of sensitive data, program and/or equipment is occurred once more from the signal of equipment but be authorized to the user at this equipment.Yet, on the equipment of being stored in or can be not in all environment, all to need by the visit of total data, program and/or the equipment of a device access.For example, during one day special time, perhaps when this equipment in the locality etc., need not visit selected data, program and/or equipment.
The defective of above-mentioned background information and current system only aims to provide some the general view and the conventional system that adopts the privacy technology and the problem of method in the background information, and not to be intended to be exhaustive.The above-mentioned shortcoming of current system only aims to provide the general view of some problems of conventional system, and not to be intended to be exhaustive.The benefit of the other problems of legacy system and the correspondence of each non-limiting example described herein can become more obvious after checking following description.
Summary of the invention
The summary of the invention of simplifying provided herein is to help that understanding basic or cardinal principle can be arranged the each side exemplary, non-limiting example in following more detailed description and the accompanying drawing.Yet content of the present invention is not intended to as general view detailed or limit.On the contrary, the sole purpose of this joint summary of the invention is, with the form proposition simplified and certain exemplary, some notions that non-limiting embodiment is relevant, as the preamble of the more detailed description of following each embodiment.
Each embodiment provided herein is to the environment with mobile or stationary electronic devices, and mobile or stationary electronic devices is configured to storage or visit data, program and/or equipment.Can combine such equipment utilization information privacy system and method to be stored on the equipment or can be by the privacy of the information of device access with enhancing.
In a non-limiting example; For example; The information privacy system can comprise environmental surveillance assembly and privacy component; The environmental surveillance arrangement of components is used for the one side of monitoring environment, and privacy component configuration is used for receiving about by the information of monitoring environment from the environmental surveillance assembly, and confirms whether the one or more factors related with environmental facies are triggered.Whether be triggered based on factor, the visit of data, program and/or equipment can be provided or stop.Whether factor includes, but not limited to the position of time, equipment, is detecting third-party motion near the equipment and/or authorizing the individual whether to appear at (or being connected to specified network) near the equipment.Therefore, camera, motion sensor, biometric sensor, GPS (GPS) sensor or the like may be utilized, to promote such system.
In another non-limiting example, can carry out the method that strengthens privacy.Method can comprise, with particular data or program and mandate individual's usability.Authorizing individual designated and be stored on the equipment or be positioned at can be by another position of device access.Authorize the individual to be different from someone of the user that signs in to equipment, for example, can include, but not limited to the member of keeper, power user, management etc.Can make about authorizing whether available the confirming of individual, and, if the visit to particular data, program or equipment can be provided.In some non-limiting examples; Through scanning to seek signal; Such as the beacon signal that is associated with the equipment that has by the mandate individual, make definite like bluetooth
Figure BDA0000145550990000021
device signal.
In another non-limiting example, the computer-readable recording medium of storage computation machine executable instruction is carried out on computing equipment in the time of should instructing, and makes said computing equipment carry out various operations.Operation can comprise, in a non-limiting example, particular data, program or equipment is associated with privacy state such as the user's who signs in to equipment mandate individual.Near the equipment of authorizing the individual, detect other third parties according to whether and confirm the privacy state.Then based on whether detecting the third party, block or grant visit associated data or program.
These are described with other non-limiting examples hereinafter in more detail.
Description of drawings
Further describe each non-limiting embodiment with reference to accompanying drawing, in the accompanying drawings:
Fig. 1 shows the block diagram according to exemplary, the non-limiting realization of the information privacy system of one or more non-limiting examples;
Fig. 2 shows the block diagram of exemplary, the non-limiting realization of institute's canned data of being used to promote the information privacy system;
Fig. 3 is the process flow diagram that exemplary, the non-limiting process that is used for the information privacy system is shown;
Fig. 4 is the process flow diagram that exemplary, the non-limiting process that is used for the information privacy system is shown;
Fig. 5 is the block diagram that exemplary, the non-limiting realization that is used for the information privacy system is shown;
Fig. 6 is the process flow diagram that exemplary, the non-limiting process that is used for the information privacy system is shown;
Fig. 7 is the process flow diagram that exemplary, the non-limiting process that is used for the information privacy system is shown;
Fig. 8 is the block diagram that exemplary, the non-limiting realization of information privacy system is shown;
Fig. 9 is a block diagram of representing wherein can be implemented in exemplary, the non-limiting networked environment of each non-limiting example described herein; And
Figure 10 is exemplary, non-limiting computing system or the block diagram of operating environment of representing wherein can to realize one or more aspects of each non-limiting example described herein.
Embodiment
Information privacy
Only if be appreciated that otherwise and clearly illustrate, the non-limiting example of confession mentioned herein is not intended to be limited to any information privacy system or environment is realized.In addition, only if otherwise illustrate, accompanying claims is not intended to be limited to information privacy system required for protection or method.
Through to the further describing of one or more non-limiting aspects of information privacy system and method, disclosed, can be based on separately or unite a plurality of factors of consideration, allow or stop such system and method for the visit of data, program and/or equipment.As an example; And it is unrestricted; Factor can comprise the time or be configured the position of the equipment of information privacy system, and whether the mandate individual who is different from the equipment user and/or detects third-party motion whether in user's specific adjacency or sign in to specified network in user's adjacency.For example, based on such environmental feedback, in case unauthorized individual gets into the room, computing equipment can start for example slave unit tabulation and hide hard disk (this is not only hiding data or program, but concealing device or other bottom hardware or firmware).
In some non-limiting examples, for example, the system that comprises environmental surveillance assembly and privacy component is provided.The environmental surveillance assembly is configured to a near aspect of the environment of surveillance equipment, and privacy component is configured to confirm based on the environment of being kept watch on whether predefined factor satisfies, and visits to allow or to stop based on so definite generation information.In some non-limiting examples, user's privacy state can be used to allow or stop the visit to data, program and/or equipment.In other non-limiting examples, authorize attending or absently can being used to allow or stop visit of individual to data, program and/or equipment.
As further description, Fig. 1 shows the block diagram according to exemplary, the non-limiting realization of the information privacy system 100 of one or more non-limiting examples.Information privacy system 100 can comprise that configuration is used for the environmental surveillance assembly 102 of an aspect of monitoring environment.
As shown in, the data of environment (for example, the time, motion is near the individual's of equipment identity etc.) can be at environmental surveillance assembly 102 places by perception.But the each side of monitoring environment.For example; Time, incident, position, the number in specific user's the room of the equipment that adopts information privacy is arranged; Personnel identity in specific user's the room of the equipment that adopts information privacy is arranged, or any amount of others that are determined and are used to provide information privacy of environment.
But environmental surveillance assembly 102 monitor temperature, heat, gas, nuclear radiation, for example, in this situation, the automatic vigilance condition of a fire of computing machine (or other can detect emergency), and and then hide or take to protect the step (uploading to the cloud storage) of confidential data automatically.
In numerous non-limiting examples, can be associated with particular data, program or equipment concomitantly or side by side basically more than a factor.So, can determine whether to block associated data, program and/or equipment or make it available before, confirm environment more than a factor or aspect.
Although data, program and/or equipment are described to be associated with the factor of the each side of indicative for environments herein; But data, program and/or equipment can comprise; But be not limited to file, video, text, figure, voice data, programming software, system software and application software etc.In each non-limiting example, can handle any amount of data of different types, include but not limited to the sensitive data of password, log-on message, financial information and other type.In non-limiting example, the equipment of described information privacy system and method capable of using can be to move or stationary electronic devices, includes but not limited to personal computer, kneetop computer, mobile phone, PDA(Personal Digital Assistant) etc.
The property purpose turns to particular aspects presented for purpose of illustration, in some non-limiting examples, can be in information privacy be provided the employing time.For example, data, program and/or equipment can join with time correlation.Therefore, at special time period or point at the appointed time, make data can use (deciphering, place on the equipment or make otherwise that it is available) and/or unlocking program and it can be used the equipment user.In section or time At All Other Times, data are blocked (deletion, hide, encrypt) and/or locking or remove program.Can (for example, Europe, east time 5-7pm) or impliedly (for example, sunrise) fixed time section or time clearly.
An aspect of environment can comprise, an incident that joins with the time correlation of on earth a position (with respect to such as the position on another celestial body of another celestial body).As an example and unrestricted, incident can be the tellurian position that is positioned at of equipment sunrise or sunset one of at least.For example, in some non-limiting examples, data, program and/or equipment can be associated with device location and celestial body position.So, this association can be related with device location and celestial body position, for example related to the device location of common time and celestial body position.In a non-limiting example, for example, can make particular data, program and/or equipment to use at sunrise in every day by the information privacy system.Sunrise is or confirming of having taken place can be based on being relevant to second celestial body, the sun, the particular device position of position.
In each non-limiting example, usually, data, program or equipment can be associated with the position of specifying individual (user who is different from the equipment that adopts information privacy).For example, can adopt bluetooth
Figure BDA0000145550990000051
technology to confirm from the signal of second equipment (for example specifying individual's equipment) whether in the user's of the equipment that adopts information privacy certain proximity.But only when the individual of appointment in the degree of approach that is identified and/or otherwise be confirmed as the time spent, the information privacy system just can provide the visit to data or program.For example; When equipment that bluetooth
Figure BDA0000145550990000052
opening of device of specifying the individual and signal are used information privacy receives (indication is specified the individual at for example in 10 meters of equipment), this appointment individual can be confirmed as available.On the contrary; When the equipment that adopts information privacy receives the signal of individual bluetooth
Figure BDA0000145550990000053
equipment of non-appointment; When perhaps specifying individual's bluetooth device shutdown, data can be blocked (encryption, hiding, slave unit deletion) or program can be locked or remove.
In some non-limiting examples; Can adopt equality, LAN Information (for example, WLAN), bluetooth
Figure BDA0000145550990000055
technology of the position of GPS (GPS), triangulation, the calculating celestial body different or any system or the method for the positional information of equipment are provided with the celestial body that equipment is positioned at.
In certain embodiments, determined position can be designated as safety, and therefore, data, program and/or equipment is by the secret that becomes, and/or the position can be designated as non-secret, and therefore, data, program and/or equipment is not by the secret that becomes.In data, program and/or equipment are not become the situation of secret, data, program and/or equipment can be opened and/or can by the user of equipment and/or in some situation near anyone visit of equipment, with reading of data and/or access program.
Go back to Fig. 1, information privacy system 100 also can comprise privacy component 104.Privacy component 104 can receive the information of the environment of indication institute perception from environmental surveillance assembly 102, and confirms whether the one or more factors related with environmental facies are triggered.
As shown in Figure 1, usually, factor (such as information shown in Figure 2) can be by privacy component 104 dynamic accesses, and perhaps factor can be stored in the information privacy system 100 of privacy component 104 and/or equipment.
Privacy component 104 can confirm whether factor is satisfied, and blocks or provide visit according to the appointed mode of factor.For example, but if the prescription factors factor that makes is satisfied, visit is provided.As another example, but, stop visit if prescription factors makes that factor is satisfied.
Privacy component 104 can generate and the information that stops or provide visit as shown in Figure 1 to be associated.In each non-limiting example, the information that is generated can comprise that password or other indication visit will be provided the order of (or being prevented from).
Therefore, the visit to data, program or the equipment that is associated with one or more factors can blocked or provide to privacy component 104.Block and can multitude of different ways carry out, include but not limited to, deletion, hide, encrypt and/or otherwise make the data indigestion.In some non-limiting examples, the encryption key that the user of data available devices or equipment can't visit is encrypted, thereby has stoped equipment to show clearly text and/or visit data.In some non-limiting examples, but data slave unit deletion (or being hidden in equipment), and the copy of data can be stored in the position of equipment inaccessible.For example, data can be stored in the cloud position of equipment inaccessible.
In some non-limiting examples, the data slave unit moves down, and data store equipment no longer again into, should can be visited once more up to the factor designation data.For example, when equipment moved on to or shift out ad-hoc location or network, data can move apart equipment, and when equipment moved into ad-hoc location or network, data can be recovered back equipment.For example; In some non-limiting examples, when the software developer works, can be provided for the software developer on the equipment at the scene of company position (on-site) to the visit of data, program and/or equipment; And when the developer took equipment from scene (off-site), visit can be prevented from.If can adopt such method with the contingent sensitive data of restriction potentially/when the developer leaves company or resigns usurp increase.In some non-limiting examples, the copy of data can be moved to cloud, and fetches from cloud in equipment is retracted ad-hoc location or network the time.
Factor can comprise break off to connect from specified network with information privacy system associated device, with the information privacy system position of associated device outside the appointed area, or specify the individual attend or absent.For example, equipment be positioned at specific geographic position or outside, or otherwise break off to connect from particular network can be factor.If the equipment of making is positioned at specific geographic position or outer, or otherwise break off confirming of connecting, the visit of particular data can be blocked or refuse from particular network, and/or program can be locked or remove the equipment that makes can not access program.So; In each non-limiting example; If generation equipment is stolen or be brought into certain zone of the world or country when equipment, in the time of wherein need not waiting the visit of the data of particular type, sensitive data (for example; Contact data, financial data, password, company's confidential data, the name that is associated with equipment or address or the like) can be by the inaccessible that becomes.The user of equipment and/or the keeper of equipment can be associated data, program and/or equipment with causing the data one or more factors that maybe will be provided visit that are blocked.
In each non-limiting example, factor can be to authorize attending or absent (or network connectivty or shortage network connectivty) of individual.For example, if authorize the individual to appear in the user's who signs in to equipment the selected distance, the visit to data, program or equipment can be provided.The system and method so, here can be limited to the user authorizes individual and user to work together and is nigh (or being connected to particular network) time therefore the visit of data, program or equipment during this period.Similarly, during these time periods, program can be unlocked or be otherwise not protected.Authorize the individual can any amount of mode to be detected, include but not limited to, through use camera and image recognition, voice recognition, motion process, biologicall test (for example, finger tip, retina/iris) sensor, with the individual password that is associated of mandate etc.
In some non-limiting examples; Privacy component is configured to; At least based on confirm according to testing process detect specified individual with the selected distance of information privacy system associated device in, the visit at least one of data, program or equipment is provided.And unrestricted, specified individual is different from the user who signs in to information privacy system associated device as an example.
In some non-limiting examples, privacy component is configured to, at least based on the individual who confirms to detect non-appointment with the selected distance of information privacy system associated device in, block visit at least one of data, program or equipment.
In some non-limiting examples, the environmental surveillance assembly comprises at least one in the following: camera, motion sensor, biometric sensor, fingerprint sensor, be configured to confirm whether can be coupled to communicatedly with information privacy system associated device the sensor or the GPS sensor of selected network.In some non-limiting examples, the environmental surveillance assembly is configured to detect at least one the non-appointment individual who utilizes camera, motion sensor, biometric sensor or fingerprint sensor.Sensor information also can be from any various types of sensors, such as body area network (BAN), wireless body area network (WBAN) or body sensor network (BSN).In this; Be appreciated that user data and position data, and the data of other type; Possibly need the agreement of given user or user's group; And therefore, whole embodiment have here conceived alternatively and have received the such user data of clear and definite or implicit agreement use and the step of position data, to satisfy the privacy principles that given purposes possibly hint.
Fig. 2 shows the block diagram of exemplary, the non-limiting realization of institute's canned data of being used to make things convenient for the information privacy system.Information can be stored on the equipment, can be by the ad-hoc location in the network of device access, and/or be stored on the server.In some non-limiting examples, server can be a Cloud Server.
As shown in Figure 2, contact data, file A and file B, and/or program A is associated with one or more different factors with B.For example, about contact data, one or more contact persons (or group of contacts) can be associated with a position.This position can be designated as the GPS position, cellular cell sign (ID) etc.If equipment shifts out ad-hoc location, contact person or group of contacts can be by automatic deletions, hide or slave unit removes.If equipment returns ad-hoc location, contact person or group of contacts can be automatically restored to equipment once more.In some non-limiting examples, server (for example, replication server) can recover contact person or group of contacts next time when duplicating.
Although only described contact data, can handle any amount of data of different types, include but not limited to the sensitive data of password, log-on message, financial information and other type.In some non-limiting examples, can the factor of indication privacy characteristic be designated as the metadata that the file of privacy is provided to it, and/or be stored in the form that points to metadata or factor (as shown in Figure 2).
When confirming that based on environment factor is true, the explanation that foundation is associated with factor, contact data, file and/or program are blocked, or the visit to data, file and/or program is provided.So, but the factor specified requirements when condition is satisfied, provides the visit to data, program and/or the equipment that is associated with factor.In other non-limiting example, according to the system designer (and/or setting of the user of equipment setting) of information privacy system, but the factor specified requirements when condition is satisfied, does not provide the visit to data, program and/or the equipment that is associated with factor.
Fig. 3 is the process flow diagram that exemplary, the non-limiting process that is used for the enhanced information privacy is shown.310, process 300 comprises, with data, program or equipment one of at least with the usability of authorizing the individual.In some non-limiting examples, user's logging device is attempted visit data or program, and authorizing the individual is the people who is different from this user.
320, process 300 comprises confirms whether the mandate individual is available.330, process 300 comprises based on confirming to authorize the individual available, provides to the visit of data or to the program release.Provide visit to comprise to data or program, with data storage can be by the network site of the device access of attempting visit data, data decryption, unlocking program, or make program remain on unlocked state.
In some non-limiting examples, confirm to authorize individual's available comprising whether, confirm radio signal from authorize individual associated device emission.In other non-limiting example, confirm to authorize individual's available comprising whether, attempt visit data with definite equipment or program parallelization ground confirms to authorize the individual visiting specified network.
Fig. 4 is the process flow diagram that exemplary, the non-limiting process that is used for the enhanced information privacy is shown.Fig. 4 can comprise the process 300 of Fig. 3.In addition, in certain embodiments, process 400 can comprise that also 410, unavailable based on confirming to authorize the individual, prevention is to the visit of data or program.In some non-limiting examples; Prevention comprises the visit of data or program, deletion or hiding data, with data storage in network site, enciphered data, the lock program of the equipment inaccessible of attempting visit data, program is maintained lock-out state or removes program.
Fig. 5 is the block diagram that exemplary, the non-limiting realization that is used for the information privacy system is shown.Of Fig. 5; Authorize individual 520 (or usually to follow the equipment of authorizing individual around the user's of equipment 510 environment to seek through scanning; For example authorize individual's bluetooth
Figure BDA0000145550990000091
equipment); Or sign in to particular network through confirming that which user is current, whether the equipment 510 that strengthens configuration with information privacy can confirm to authorize individual 520 within the selected degree of approach of equipment.Authorize individual 520 in the selected degree of approach or login if the equipment 510 that strengthens configuration with information privacy detects, can allow data, program, and/or the visit of equipment.On the contrary, do not authorize individual 520 in the selected degree of approach or login, can stop data, program if the equipment 510 that strengthens configuration with information privacy detects, and/or the visit of equipment.
In some non-limiting examples, data, program and/or equipment can be associated with people's in the room quantity.People's quantity can be indicated the user's of the equipment that adopts information privacy privacy state.For example, particular data, program or equipment only can be indicated as when those data, program or equipment that the user of equipment can be visited alone the time (and make do not have other people with this user together indoor or with this user's certain proximity in confirm).
Can or confirm people's quantity by camera through motion or video (or audio frequency) sensor senses.When sensor or camera detect the user alone indoor (perhaps do not have other user with this user's certain proximity in), data are deciphered, program is unlocked, data, program and/or equipment can be used by the user.On the contrary, when detecting, make the data, program and/or the equipment that are associated unavailable so more than a people (people who perhaps is different from this user).Therefore, the user of equipment can be restricted to sensitive data, program and/or the equipment of only when authorized user occurs or logins, just working in.This can be convenient to the supervision of the management level of work that selected data is carried out and/or the work of in selected program, carrying out.
Fig. 6 illustrates the process flow diagram that is used for based on the exemplary non-limiting process of the user's of the equipment that adopts information privacy privacy state enhanced information privacy.610, process 600 can comprise, data, program or the equipment privacy state with the mandate individual is associated.Whether the privacy state can detect in authorizing individual's a distance by and be different from other people that authorize the individual and indicate.
620, process 600 can comprise the privacy state of confirming to authorize the individual.630, process 600 can comprise based on the privacy state of authorizing the individual blocks or provides the visit to data or program.
In some non-limiting examples, the user can work in the room and one or more people can come into the room and/or get into user's the appointment degree of approach.The information privacy system is protected data automatically.
Fig. 7 is the process flow diagram that exemplary, the non-limiting process that is used for the enhanced information privacy is shown.Fig. 7 can comprise the process 600 of Fig. 6.In addition, in certain embodiments, process 700 can comprise, in step 710, detect be different from authorize the individual one or more other people in authorizing individual's a distance, and based on the visit to data or program is blocked in one or more other people detections.In step 720, process 700 can comprise fail to detect be different from authorize the individual one or more other people in authorizing individual's a distance, and based on the visit to data or program being provided to one or more other people detection failures.Whether motion sensor capable of using or camera detect has anyone in the specific range of authorizing the individual, to carry out detection.
Fig. 8 is the block diagram that exemplary, the non-limiting realization that is used for the information privacy system is shown.As shown in Figure 8, the equipment 810 that strengthens configuration with information privacy can confirm whether any third party 820 is arranged in the selected degree of approach of equipment, or whether the user is alone in room or other designated geographic area.In some non-limiting examples, equipment 810 can be sought motion around the user's of equipment 810 environment through scanning, makes such confirming.Do not detect the motion that is not associated if strengthen the equipment 810 of configuration with information privacy, can allow visit data, program and/or equipment with the user of equipment 810.On the contrary, detect the motion (for example, third party 820 motion) that is not associated, can stop visit data, program and/or equipment with the user of equipment 810 if strengthen the equipment 810 that disposes with information privacy.In such situation, when the user alone the time user can work in certain sensitive data, program and/or equipment, if and/or the equipment of storage sensitive data, program and/or equipment stolen, can stop visit to data, program and/or equipment.
As said, can regulate based on the various environmental factors of discussing among superincumbent one or more embodiment the visit of data.In this, data can be represented the information of any kind, and therefore, in fact can't enumerate whole examples of existing all types of data, yet, be noted that the data of having conceived all types and form are used for technology discussed herein.For example, one type data are video contents, for example film.In this, for some illustrative case, based on the film grading, depend on the people in the viewing distance, content possibly be suitable for or maybe improper watching.In this situation, action can be: hide the visit to film of film, encryption or alternate manner refusal.During if cin positive film is watched, can be based on trigger event with its " time-out " so that the action of other type that can take to be shown.As another example, father is seeing action movie, the entering living room and his little daughter wakes up midnight.In this situation, computing equipment can detect this situation automatically, and suspends film, and, for example, remove the back in situation and continue automatically to play.
In various non-limiting examples, camera/Flame Image Process and/or motion process may be utilized, and come to confirm respectively to be different from user's other people appearance or motion.Also can adopt other technology, include but not limited to, cooperate between equipment and the wireless carriers, come announcement apparatus, the wireless device that is associated with Virtual network operator is in the certain proximity of the equipment that has disposed the information privacy enhancing.In some non-limiting examples; Whether microphone or voice recognition software can be used to detect from third-party sound in the zone of equipment, perhaps can use voice signature to find out detected sound and be associated with the user of the equipment that has disposed the information privacy enhancing.
Exemplary networked and distributed environment
It will be appreciated by those skilled in the art that; Each non-limiting example of information privacy system and method described herein can combine any computing machine or other client computer or server apparatus to realize; This any computing machine or other client computer or server apparatus can be used as the part of computer network and dispose or be deployed in the DCE, and can be connected to the data storage of any kind of.In this, each non-limiting example described herein can have any amount of storer or a storage unit and any amount of application and process stride in any computer system that any amount of storage unit takes place or the environment and realize.This includes but not limited to have and is deployed in the network environment with long-range or local storage or the environment of server computer in the DCE and client computer.
Distributed Calculation provides sharing of computer resource and service through the communication exchange between computing equipment and the system.These resources comprise the exchange of information with service, for the cache stores and the disk storage of the object such as file.These resources and service comprise that also the processing power between a plurality of processing units is shared so that carry out load balance, resource expansion, processing specialization or the like.Distributed Calculation utilizes network to connect, thereby allows client to utilize its collective power that whole enterprise is benefited.In this, can have can be like application, object or the resource with reference to the described participation data-privacy of each non-limiting example of present disclosure mechanism for various device.
Fig. 9 provides the exemplary networking or the synoptic diagram of DCE.This DCE comprises calculating object 910,912 etc. and calculating object or equipment 920,922,924,926,928 etc., and these calculating objects or equipment can comprise as using 930,932,934,936,938 represented programs, method, data storage, FPGA etc.Be appreciated that; Calculating objects 910,912 etc. and calculating object or equipment 920,922,924,926,928 etc. can comprise different equipment, such as PDA(Personal Digital Assistant), audio/video devices, mobile phone, MP3 player, personal computer, laptop computer etc.
Each calculating object 910,912 etc. and calculating object or equipment 920,922,924,926,928 etc. can be communicated by letter with one or more other calculating objects 910,912 etc. and calculating object or equipment 920,922,924,926,928 etc. via communication network 940 directly or indirectly.Although in Fig. 9, be illustrated as discrete component, communication network 940 can comprise that the system to Fig. 9 provides other calculating objects or the computing equipment of service and/or can represent unshowned a plurality of interconnection network.Each calculating object 910,912 etc. or calculating object or equipment 920,922,924,926,928 etc. can also comprise application, such as can utilize API or other objects, software, firmware and/or hardware, be suitable for realizing data-privacy that provides according to each non-limiting example of the present invention or the application that communicates with it 930,932,934,936,938.
There are various systems, assembly and the network configuration of supporting DCE.For example, computing system can be linked together by wired or wireless system, local network or the network that extensively distributes.Current; Many networks are coupled to the Internet; The latter is provide the foundation structure and comprise many various network of the calculating that extensively distributes, but the example communication that any network infrastructure can be used for becoming and is associated with serializability snapshot isolation system described in each non-limiting example.
Thus, can use network topology structure and the main frame of network infrastructure such as client/server, equity or hybrid architecture." client " be to use with one type of the service of its irrelevant another kind of or group or group in the member.Client can be a process, promptly is that a group of the request service that another program or process provided instructs or task haply.Client process is used institute's requested service, and need not " knowing " any operational detail about other programs or service itself.
In client/server architecture, especially in networked system, client computer is normally visited the computing machine of the network resource shared that is provided by another computing machines such as for example servers.In the diagram of accompanying drawing 9; As non-limiting example; Calculating object or equipment 920,922,924,926,928 etc. can be considered to client and calculating object 910,912 etc. can be considered to server; Wherein conduct such as calculating object 910,912 provides the server of data, services; Such as receiving data, storage data, deal with data from client calculating object or equipment 920,922,924,926,928 etc., sending data,, any computing machine is considered to client, server or both but all can be depending on environment to client calculating object or equipment 920,922,924,926,928 etc.But any deal with data in these computing equipments or request can hint as here with reference to the service or the task of the described data-privacy of one or more non-limiting examples technology.
Server normally can be through the remote computer system of telecommunication network such as the Internet or wireless network infrastructure or local network visit.Client process can be movable in first computer system, and server processes can be movable in second computer system, and they intercom through communication media mutually, distributed function is provided thus and allows a plurality of clients to utilize the information gathering ability of server.Any software object that utilizes according to technology described herein can provide separately or distribute on a plurality of computing equipments or the object.
At communication network 940 or bus is in the Internet environment; For example, calculating object 910,912 etc. can be that other calculating objects or equipment 920,922,924,926,928 etc. are via any Web server that communicates with in the multiple known protocol such as HTTP(Hypertext Transport Protocol).Calculating objects 910,912 etc. also can be used as the for example client of calculating object or equipment 920,922,924,926,928 etc. as server, and this can be the characteristic like DCE.
Example calculation equipment
As described, advantageously, technology described herein promotes any equipment of information privacy applicable to expectation.Therefore, be appreciated that hand-held, portable and other computing equipment and the calculating object of having conceived all kinds that combines each non-limiting example use, that is, can expect to have any situation the control of privacy at equipment.Therefore, be an example of computing equipment in the general purpose remote computer described in Figure 10 below.
Although it is and undesired; But each non-limiting example can partly realize via operating system, uses and/or be included in the developer of services of supply equipment or object in the application software of the one or more function aspects that are used to carry out each non-limiting example described herein.Software can be described in the general context of the performed computer executable instructions such as program module of the one or more computing machines such as client workstation, server or other equipment.Those skilled in the art will appreciate that computer system has various configurations and the agreement that can be used for Data transmission, and do not have customized configuration or agreement will be considered to restrictive thus.
Figure 10 shows an example of the suitable computingasystem environment 1000 of one or more aspects that wherein can realize each non-limiting example as herein described thus; Although as stated; Computingasystem environment 1000 is merely an example of suitable computing environment, is not that usable range or function are proposed any restriction.Should computingasystem environment 1000 be interpreted as yet any one or its combination in the assembly shown in the exemplary computer system environment 1000 are had any dependence or requirement.
With reference to Figure 10, the exemplary remote equipment that is used to realize one or more non-limiting examples comprises the universal computing device of computing machine 1010 forms.The assembly of computing machine 1010 can include, but not limited to processing unit 1020, system storage 1030 and will comprise that the various system components of system storage are coupled to the system bus 1022 of processing unit 1020.
Computing machine 1010 generally includes various computer-readable mediums, and can be can be by any usable medium of computing machine 1010 visits.System storage 1030 can comprise volatibility and/or the computer-readable storage medium of nonvolatile memory form such as ROM (read-only memory) (ROM) and/or random-access memory (ram).Computer-readable medium can also include but not limited to, magnetic storage apparatus (for example, hard disk, floppy disk, magnetic stripe), CD (for example, compact-disc CD, digital versatile disc DVD), smart card, and/or flash memory device (for example, card, rod, key drive).And unrestricted, system storage 1030 also can comprise operating system, application program, other program modules and routine data as an example.
The user can be through input equipment 1040 to computing machine 1010 input commands and information.The display device of monitor or other types also is connected to system bus 1022 via the interface such as output interface 1050.Except that monitor, computing machine also can comprise other the peripheral output devices such as loudspeaker and printer, and they can connect through output interface 1050.
The logic that computing machine 1010 can use one or more other remote computers (such as remote computer 1070) is connected in networking or the distributed environment and operates.Remote computer 1070 can be personal computer, server, router, network PC, peer device or other common network nodes or consumption of any other remote media or transmission equipment, and can comprise above about computing machine 1010 described any or whole elements.Logic shown in Figure 10 connects and comprises the network 1072 such as Local Area Network or wide area network (WAN), but also can comprise other network/bus.These networked environments are common in computer network, Intranet and the Internet of family, office, enterprise-wide.
As stated, although combine various computing equipments and network architecture to describe each exemplary, non-limiting example, the bottom notion can be applied to any network system and any computing equipment or system.
And; There is the several different methods that realizes same or similar function; For example appropriate application program DLL (API), tool box, driver source code, operating system, control, independence or downloadable software object etc., they make application and service can use technology provided herein.Thus, each non-limiting example is here conceived from the viewpoint of API (or other software objects) and from the software or the hardware objects of one or more aspects of realizing data-privacy technology described herein.Thus, each non-limiting example described herein can have the aspect that adopts hardware, part to adopt hardware and part to adopt software and adopt software fully.
Word used herein " exemplary " means as example, instance or explanation.For avoiding feeling uncertain, theme disclosed herein is not limited to these examples.In addition, said any aspect that is described to " exemplary " or design might not be interpreted as and compare others or design more preferably or favourable.In addition; On the degree of use a technical term " comprising ", " having ", " comprising " and other similar words; For avoiding feeling uncertain, these terms be intended to be similar to term " comprise " mode as open transition speech be comprising property and do not get rid of any additional or other elements.
As described, but various technology combined with hardware described herein or software or, in due course, realize with both combination.As as used herein, term " assembly ", " system " etc. are intended to refer to computer related entity equally, or combination, software or the executory software of hardware, hardware and software.For example, assembly can be, but be not limited to be the thread of the process of on processor, moving, processor, object, executable code, execution, program and/or computing machine.As explanation, the application and the computing machine of operation can be assemblies on computers.One or more assemblies can reside in process and/or the execution thread, and assembly can and/or be distributed between two or more computing machines in a computing machine.As another example,,, make and the computing equipment executable operations can realize one or more embodiment in response to execution by computing equipment according to the computer-readable medium of storage computation machine executable instruction.
Foregoing system is with reference to describing between some assemblies alternately.Be appreciated that these systems and assembly can comprise the sub-component of assembly or appointment, assembly or the sub-component and/or the additional assembly of some appointment, and according to the various displacements and the combination of foregoing.Sub-component also can be used as the assembly that is coupled to other assemblies communicatedly and realizes, rather than is included in the parent component (level).In addition; Note; One or more assemblies can be combined into the single component that aggregation capability is provided, or are divided into plurality of single sub-component, and any one or a plurality of middle layer such as administration and supervision authorities can be configured to be coupled to communicatedly these sub-components so that integrated functionality is provided.Any assembly described herein also can with one or more special here describe but general other the known assemblies of those skilled in the art carry out alternately.
Example system in view of the above also can be understood the method that realizes according to described theme with reference to the process flow diagram of each accompanying drawing.Although for the purpose of interest of clarity; The method that illustrates and describe as a series of frames; But should be appreciated that each non-limiting example is not limited only to the order of frame, because some frames are described the order generation different with the frame of describing and/or taken place concomitantly with other frames in the place therewith.Although show the flow process of non-order or branch, be appreciated that the order of various other branches, flow path and the frame that can realize reaching identical or similar results via process flow diagram.In addition, be not the frame shown in all be to realize that method described below is necessary.
Except that described herein each non-limiting example; Be to be understood that; Can use other similar non-limiting examples, perhaps can modify with adding and not deviate from these non-limiting examples said non-limiting example so that carry out the identical or equivalent function of corresponding non-limiting example.In addition, a plurality of process chip or a plurality of equipment can be shared the performance of one or more functions described herein, and similarly, storage can be striden a plurality of equipment and realized.Therefore, the present invention should not be limited to any single non-limiting example, but will explain according to range, spirit and the scope of appended claims.

Claims (15)

1. information privacy system comprises:
Environmental surveillance assembly (102), configuration is used for the one side of monitoring environment; And
Privacy component (104) is configured to:
Confirm whether the one or more factors related with said environmental facies are triggered; And
Confirm based on what one or more factors were triggered, to the visit of the data, program or the equipment that are associated with said one or more factors block or provide one of at least.
2. information privacy as claimed in claim 1 system; It is characterized in that; Said environmental surveillance assembly (102) comprise in the following one of at least: camera, motion sensor, biometric sensor, fingerprint sensor, body area network, wireless body area network; Body sensor network, or configuration is used for confirming whether being coupled to communicatedly with said information privacy system associated device the sensor or the Global Positioning System Sensor Unit of selected network.
3. information privacy as claimed in claim 1 system; It is characterized in that; Said one side comprises the incident that the time correlation with on earth position joins, and with respect to the position on another celestial body, is positioned at tellurian said position with said information privacy system associated device.
4. information privacy as claimed in claim 1 system is characterized in that, said incident be sunrise or sunset one of at least.
5. information privacy as claimed in claim 1 system; It is characterized in that; Said one or more factor comprise following one of at least: break off first computing equipment that is associated with said information privacy system that connects from specified network; The position of first computing equipment outside the appointed area that is associated with the information privacy system, or with second computing equipment of specifying the individual to be associated attend or absent.
6. information privacy as claimed in claim 5 system; It is characterized in that; Said privacy component (104) is arranged to; Based on said specify said second computing equipment that the individual is associated with the selected distance of said information privacy system associated device in detection, the visit one of at least to said data, program or equipment is provided.
7. information privacy as claimed in claim 6 system is characterized in that, the said user who specifies the individual to be different to sign in to said information privacy system associated device.
8. information privacy as claimed in claim 6 system; It is characterized in that; Said environmental surveillance assembly (102) configuration is used for; Utilize camera, motion sensor, biometric sensor, fingerprint sensor or configuration be used to scan with seek the sensor that sends the equipment of specifying beacon signal one of at least, it is individual to detect said appointments.
9. information privacy as claimed in claim 6 system; It is characterized in that; Said environmental surveillance assembly (102) configuration is used for, and utilizes configuration to be used to scan to seek the sensor of the equipment that sends said appointment beacon signal, detects and the individual associated device of said appointment.
10. information privacy as claimed in claim 5 system; It is characterized in that; Said privacy component (104) is arranged to; Based on specifying the detection in the selected distance of said first computing equipment that is associated with said information privacy system of the 3rd calculating equipment that the individual is associated, block visit one of at least to said data, program or equipment with non-.
11. a method that is used to strengthen privacy comprises:
The instruction of on computing equipment, carrying out makes said computing equipment carry out when being performed and comprises following operation:
With data, program or equipment one of at least with the usability (310) of authorizing the individual, the wherein said user one of at least who authorizes the individual to be different to sign in to computing equipment to attempt to visit said data, program or equipment;
Confirm that (320) said mandate individual is available; And
Based on confirming that said mandate individual is available, visit or the said data of release, program or equipment (330) to said data, program or equipment are provided.
12. method as claimed in claim 11 is characterized in that, confirms that (320) said individual of mandate confirms that radio signal is to launch from the computing equipment that is associated with the said individual of mandate available comprising.
13. method as claimed in claim 11; It is characterized in that, provide visit (330) one of at least to said data, program or equipment comprise following one of at least: with data storage in network site that the equipment of attempting to visit said data can be visited, decipher said data, the said program of release or equipment or said program or equipment maintained released state.
14. method as claimed in claim 11 is characterized in that, also comprises, based on confirming that said mandate individual is unavailable, stops the visit (410) to said data, program or equipment.
15. method as claimed in claim 11; It is characterized in that; Prevention to the visit (410) one of at least of data, program or equipment comprise following one of at least: deleted data, hiding data, with data storage in network site that the equipment of attempting to visit said data can not be visited, encrypt said data, the said program of locking or equipment, or said program or equipment are maintained lock-out state.
CN201210076442.5A 2011-03-21 2012-03-21 information privacy system and method Active CN102750465B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US13/052,437 2011-03-21
US13/052,437 US9189606B2 (en) 2011-03-21 2011-03-21 Information privacy system and method

Publications (2)

Publication Number Publication Date
CN102750465A true CN102750465A (en) 2012-10-24
CN102750465B CN102750465B (en) 2017-03-01

Family

ID=46878471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210076442.5A Active CN102750465B (en) 2011-03-21 2012-03-21 information privacy system and method

Country Status (3)

Country Link
US (3) US9189606B2 (en)
CN (1) CN102750465B (en)
WO (1) WO2012129009A1 (en)

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103761461A (en) * 2014-02-20 2014-04-30 联想(北京)有限公司 Control method, control device, processor of electronic equipment and electronic equipment
CN104331648A (en) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 Locking system, locking method, unlocking system and unlocking method for application
CN104410601A (en) * 2014-08-28 2015-03-11 中国联合网络通信集团有限公司 Access control method, access control system and wearable equipment
CN104967724A (en) * 2015-04-29 2015-10-07 努比亚技术有限公司 Terminal information display control method and terminal information display control device
CN105005740A (en) * 2015-08-04 2015-10-28 广东欧珀移动通信有限公司 Method and system for controlling terminal application
CN105187662A (en) * 2015-09-28 2015-12-23 努比亚技术有限公司 Device and method for adaptively filtering personal privacy information and mobile terminal
CN105955051A (en) * 2016-06-20 2016-09-21 北京小米移动软件有限公司 Intelligent household equipment control method and apparatus
CN106576222A (en) * 2014-09-26 2017-04-19 迈克菲股份有限公司 Fuzzy fingerprinting of communicating wearables
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment
CN106650367A (en) * 2016-09-30 2017-05-10 维沃移动通信有限公司 Private content display method and mobile terminal
CN104036195B (en) * 2013-03-07 2017-07-25 联想(北京)有限公司 Information processing method and device
CN107710713A (en) * 2015-02-04 2018-02-16 艾瑞迪尔通信有限公司 Use nerve and the data encryption/decryption of the mechanical fingerprint of nerve
CN107969154A (en) * 2015-03-06 2018-04-27 诺基亚技术有限公司 Privacy management
CN108965982A (en) * 2018-08-28 2018-12-07 百度在线网络技术(北京)有限公司 Video recording method, device, electronic equipment and readable storage medium storing program for executing
CN109325374A (en) * 2017-08-01 2019-02-12 黑莓有限公司 The method of electronic equipment and application privacy filter including display
CN109863504A (en) * 2017-09-30 2019-06-07 华为技术有限公司 A kind of cryptographic check method, cipher set-up method and mobile terminal
CN110020545A (en) * 2018-01-08 2019-07-16 国际商业机器公司 For protecting the cognition component and user interface components of privacy and safety
CN111142973A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Information processing method, device, electronic equipment and medium
CN111625867A (en) * 2014-11-26 2020-09-04 里德爱思唯尔股份有限公司雷克萨斯尼克萨斯分公司 System and method for implementing a privacy firewall
CN112106049A (en) * 2018-05-11 2020-12-18 贝宝公司 System and method for generating private data isolation and reporting

Families Citing this family (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9189606B2 (en) * 2011-03-21 2015-11-17 Microsoft Technology Licensing, Llc Information privacy system and method
US9467424B2 (en) 2011-10-07 2016-10-11 Salesforce.Com, Inc. Methods and systems for proxying data
US9400893B2 (en) 2011-12-15 2016-07-26 Facebook, Inc. Multi-user login for shared mobile devices
JP5861529B2 (en) * 2012-03-27 2016-02-16 富士通株式会社 Biometric authentication device, biometric authentication system, biometric authentication method, biometric authentication program
US9736265B2 (en) * 2012-08-09 2017-08-15 Facebook, Inc. Handling notifications
CN103914643A (en) * 2012-12-31 2014-07-09 伊姆西公司 Method, system and device for securely operating computer
US8925037B2 (en) * 2013-01-02 2014-12-30 Symantec Corporation Systems and methods for enforcing data-loss-prevention policies using mobile sensors
US9124559B2 (en) * 2013-01-23 2015-09-01 International Business Machines Corporation System and method for temporary obfuscation during collaborative communications
US9225677B2 (en) * 2013-03-15 2015-12-29 Facebook, Inc. Systems and methods for displaying a digest of messages or notifications without launching applications associated with the messages or notifications
US10430608B2 (en) * 2013-06-14 2019-10-01 Salesforce.Com, Inc. Systems and methods of automated compliance with data privacy laws
US10423766B2 (en) 2014-06-27 2019-09-24 Microsoft Technology Licensing, Llc Data protection system based on user input patterns on device
US10474849B2 (en) 2014-06-27 2019-11-12 Microsoft Technology Licensing, Llc System for data protection in power off mode
US10372937B2 (en) 2014-06-27 2019-08-06 Microsoft Technology Licensing, Llc Data protection based on user input during device boot-up, user login, and device shut-down states
MX2016016624A (en) * 2014-06-27 2017-04-27 Microsoft Technology Licensing Llc Data protection based on user and gesture recognition.
CN104318170B (en) * 2014-09-29 2018-02-16 广东欧珀移动通信有限公司 A kind of method and device based on multi-mobile-terminal protection data safety
US9959425B2 (en) * 2014-12-31 2018-05-01 Reliance Jio Infocomm Limited Method and system of privacy protection in antagonistic social milieu/dark privacy spots
US20160248767A1 (en) * 2015-02-23 2016-08-25 Apollo Education Group, Inc. Method and system for secure communications
CN105631275B (en) * 2015-04-15 2018-12-25 宇龙计算机通信科技(深圳)有限公司 information display method, information display device and terminal
US9817958B1 (en) 2015-08-25 2017-11-14 Symantec Corporation Systems and methods for authenticating users
US10404697B1 (en) 2015-12-28 2019-09-03 Symantec Corporation Systems and methods for using vehicles as information sources for knowledge-based authentication
US10326733B2 (en) 2015-12-30 2019-06-18 Symantec Corporation Systems and methods for facilitating single sign-on for multiple devices
US10116513B1 (en) 2016-02-10 2018-10-30 Symantec Corporation Systems and methods for managing smart building systems
CN105787316A (en) * 2016-02-29 2016-07-20 联想(北京)有限公司 Information processing method and electronic device
CN105868606A (en) * 2016-03-25 2016-08-17 乐视控股(北京)有限公司 Intelligent terminal control device and method
CN106127070B (en) * 2016-06-21 2019-04-12 宇龙计算机通信科技(深圳)有限公司 A kind of method, apparatus and terminal of data sharing
US10375114B1 (en) 2016-06-27 2019-08-06 Symantec Corporation Systems and methods for enforcing access-control policies
US10462184B1 (en) 2016-06-28 2019-10-29 Symantec Corporation Systems and methods for enforcing access-control policies in an arbitrary physical space
CN106650485B (en) * 2016-09-18 2019-06-28 山东大学 Personalized environment based on Android perceives method for secret protection
US10469457B1 (en) 2016-09-26 2019-11-05 Symantec Corporation Systems and methods for securely sharing cloud-service credentials within a network of computing devices
CN108574760A (en) 2017-03-08 2018-09-25 阿里巴巴集团控股有限公司 The display methods and device of associated person information and the display methods and device of information
US10812981B1 (en) 2017-03-22 2020-10-20 NortonLifeLock, Inc. Systems and methods for certifying geolocation coordinates of computing devices
US10750015B2 (en) * 2017-09-20 2020-08-18 Paypal, Inc. Authenticating with a service provider using a virtual assistant device
CN108183912A (en) * 2018-01-03 2018-06-19 北京海杭通讯科技有限公司 A kind of method for secret protection based on cloud server
US11087020B2 (en) * 2018-11-28 2021-08-10 Vmware, Inc. Providing transparency in private-user-data access
US11328051B2 (en) * 2019-07-30 2022-05-10 Ppip, Llc System, methods, and devices responsive to audio signatures

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
US20060014532A1 (en) * 2004-07-15 2006-01-19 Seligmann Doree D Proximity-based authorization
CN1764884A (en) * 2003-04-02 2006-04-26 日本电气株式会社 Be used to authorize device to the visit of electronic equipment
CN1812477A (en) * 2005-01-25 2006-08-02 京瓷美达株式会社 Data forming device and data safety management method

Family Cites Families (29)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6367020B1 (en) * 1998-03-09 2002-04-02 Micron Technology, Inc. System for automatically initiating a computer security and/or screen saver mode
US6965873B1 (en) * 1998-04-16 2005-11-15 Digimarc Corporation Electronic commerce using optical input device
US6144161A (en) * 1998-06-16 2000-11-07 Inform 2000 Microcomputer controlled photocell unit
US7107455B1 (en) * 1999-11-04 2006-09-12 Dell Usa, L.P. Computer information access based on a transmitted identification signal
US8732232B2 (en) * 2001-05-16 2014-05-20 Facebook, Inc. Proximity synchronizing audio playback device
US7389123B2 (en) 2003-04-29 2008-06-17 Sony Ericsson Mobile Communications Ab Mobile apparatus with remote lock and control function
US7555546B1 (en) 2003-09-25 2009-06-30 Nortel Networks Limited Enterprise network services architecture
US7567176B2 (en) * 2004-05-17 2009-07-28 Randy Stephens Location-based anti-theft and security system and method
US20080109895A1 (en) * 2004-08-10 2008-05-08 Koninklijke Philips Electronics, N.V. Method and System for Multi-Authentication Logon Control
US8904185B2 (en) * 2004-11-10 2014-12-02 International Business Machines Corporation Presence sensing information security
US20070033607A1 (en) * 2005-08-08 2007-02-08 Bryan David A Presence and proximity responsive program display
KR20080005840A (en) * 2006-07-10 2008-01-15 삼성전자주식회사 Method for providing access rights based on device proximity and central access device therefor
US20080109888A1 (en) * 2006-09-14 2008-05-08 Shah Ullah Methods and systems for securing content projected to a nearby device
US7603435B2 (en) * 2006-11-15 2009-10-13 Palm, Inc. Over-the-air device kill pill and lock
US8655939B2 (en) * 2007-01-05 2014-02-18 Digital Doors, Inc. Electromagnetic pulse (EMP) hardened information infrastructure with extractor, cloud dispersal, secure storage, content analysis and classification and method therefor
IL183386A0 (en) 2007-05-24 2007-09-20 Wavebreak Technologies Ltd Systems and methods for counting an audience
US20080303630A1 (en) 2007-06-06 2008-12-11 Danilo Jose Martinez DigiKey and DigiLock
US8181031B2 (en) 2007-08-01 2012-05-15 International Business Machines Corporation Biometric authentication device and system
US8299889B2 (en) 2007-12-07 2012-10-30 Cisco Technology, Inc. Home entertainment system providing presence and mobility via remote control authentication
US9264231B2 (en) * 2008-01-24 2016-02-16 Intermec Ip Corp. System and method of using RFID tag proximity to grant security access to a computer
US8102238B2 (en) * 2008-05-30 2012-01-24 International Business Machines Corporation Using an RFID device to enhance security by determining whether a person in a secure area is accompanied by an authorized person
JP5344546B2 (en) * 2008-07-09 2013-11-20 キヤノン株式会社 Information processing apparatus, information processing apparatus control method, storage medium, and program
US20100217977A1 (en) 2009-02-23 2010-08-26 William Preston Goodwill Systems and methods of security for an object based storage device
US8447986B2 (en) * 2010-06-23 2013-05-21 Microsoft Corporation Accessing restricted content based on proximity
US8811948B2 (en) * 2010-07-09 2014-08-19 Microsoft Corporation Above-lock camera access
US8839371B2 (en) * 2010-08-26 2014-09-16 Standard Microsystems Corporation Method and system for securing access to a storage device
US20120197090A1 (en) * 2011-02-01 2012-08-02 Pensiero Medical Electronics Corp. Biomedical device with near field communication (nfc) function and method thereof for user identification, biomedical data measurement, biomedical data upload/download, biomedical data management, and remote medical care
US9189606B2 (en) * 2011-03-21 2015-11-17 Microsoft Technology Licensing, Llc Information privacy system and method
US10824741B1 (en) * 2017-03-15 2020-11-03 Alarm.Com Incorporated Device lockdown

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6189105B1 (en) * 1998-02-20 2001-02-13 Lucent Technologies, Inc. Proximity detection of valid computer user
CN1764884A (en) * 2003-04-02 2006-04-26 日本电气株式会社 Be used to authorize device to the visit of electronic equipment
US20060014532A1 (en) * 2004-07-15 2006-01-19 Seligmann Doree D Proximity-based authorization
CN1812477A (en) * 2005-01-25 2006-08-02 京瓷美达株式会社 Data forming device and data safety management method

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104036195B (en) * 2013-03-07 2017-07-25 联想(北京)有限公司 Information processing method and device
CN103761461A (en) * 2014-02-20 2014-04-30 联想(北京)有限公司 Control method, control device, processor of electronic equipment and electronic equipment
CN104410601A (en) * 2014-08-28 2015-03-11 中国联合网络通信集团有限公司 Access control method, access control system and wearable equipment
CN106576222A (en) * 2014-09-26 2017-04-19 迈克菲股份有限公司 Fuzzy fingerprinting of communicating wearables
CN104331648A (en) * 2014-11-24 2015-02-04 上海斐讯数据通信技术有限公司 Locking system, locking method, unlocking system and unlocking method for application
CN111625867A (en) * 2014-11-26 2020-09-04 里德爱思唯尔股份有限公司雷克萨斯尼克萨斯分公司 System and method for implementing a privacy firewall
CN107710713B (en) * 2015-02-04 2021-07-02 艾瑞迪尔通信有限公司 Data encryption/decryption using neural and neuro-mechanical fingerprints
CN107710713A (en) * 2015-02-04 2018-02-16 艾瑞迪尔通信有限公司 Use nerve and the data encryption/decryption of the mechanical fingerprint of nerve
CN107969154A (en) * 2015-03-06 2018-04-27 诺基亚技术有限公司 Privacy management
CN104967724A (en) * 2015-04-29 2015-10-07 努比亚技术有限公司 Terminal information display control method and terminal information display control device
CN105005740A (en) * 2015-08-04 2015-10-28 广东欧珀移动通信有限公司 Method and system for controlling terminal application
CN105005740B (en) * 2015-08-04 2018-01-16 广东欧珀移动通信有限公司 The control method and system of terminal applies
CN105187662A (en) * 2015-09-28 2015-12-23 努比亚技术有限公司 Device and method for adaptively filtering personal privacy information and mobile terminal
CN105955051A (en) * 2016-06-20 2016-09-21 北京小米移动软件有限公司 Intelligent household equipment control method and apparatus
CN106650367A (en) * 2016-09-30 2017-05-10 维沃移动通信有限公司 Private content display method and mobile terminal
CN106611111A (en) * 2016-12-12 2017-05-03 珠海市魅族科技有限公司 Use control method and apparatus for terminal equipment
CN109325374A (en) * 2017-08-01 2019-02-12 黑莓有限公司 The method of electronic equipment and application privacy filter including display
CN109863504A (en) * 2017-09-30 2019-06-07 华为技术有限公司 A kind of cryptographic check method, cipher set-up method and mobile terminal
US11899778B2 (en) 2017-09-30 2024-02-13 Huawei Technologies Co., Ltd. Password verification method, password setting method, and mobile terminal
CN110020545A (en) * 2018-01-08 2019-07-16 国际商业机器公司 For protecting the cognition component and user interface components of privacy and safety
CN112106049A (en) * 2018-05-11 2020-12-18 贝宝公司 System and method for generating private data isolation and reporting
CN108965982A (en) * 2018-08-28 2018-12-07 百度在线网络技术(北京)有限公司 Video recording method, device, electronic equipment and readable storage medium storing program for executing
US10880495B2 (en) 2018-08-28 2020-12-29 Baidu Online Network Technology (Beijing) Co., Ltd. Video recording method and apparatus, electronic device and readable storage medium
CN111142973A (en) * 2019-12-31 2020-05-12 联想(北京)有限公司 Information processing method, device, electronic equipment and medium

Also Published As

Publication number Publication date
US9189606B2 (en) 2015-11-17
CN102750465B (en) 2017-03-01
WO2012129009A1 (en) 2012-09-27
US20190294808A1 (en) 2019-09-26
US11182493B2 (en) 2021-11-23
US20160034697A1 (en) 2016-02-04
US20120246739A1 (en) 2012-09-27

Similar Documents

Publication Publication Date Title
CN102750465A (en) Information privacy system and method
US10977919B2 (en) Security system coupled to a door lock system
US20210227388A1 (en) Intelligent door lock system in communication with mobile device that stores associated user data
US10443266B2 (en) Intelligent door lock system with manual operation and push notification
CA3093674C (en) System for validating and appending incident-related data records in a distributed electronic ledger
US9683391B2 (en) Intelligent door lock system including intelligent security system with reduced latency
US9704320B2 (en) Intelligent door lock system with encryption
US9647996B2 (en) Low power device with encryption
US10691953B2 (en) Door lock system with one or more virtual fences
US9727328B2 (en) Intelligent door lock system with firmware updates
US10017963B2 (en) Intelligent door lock system with manual operation and push notification
US10388094B2 (en) Intelligent door lock system with notification to user regarding battery status
US9400881B2 (en) Converged logical and physical security
US11244524B2 (en) System and method for managing electronic locks
US20160319569A1 (en) Intelligent door lock system with a housing having a minimum internal volume
WO2020086246A1 (en) Method to establish distributed ledger networks with multiple access levels for an incident
CN111354102B (en) Operation attention and establishment method, terminal and storage medium
Lubensky et al. Cognitive mobile security: invited conference keynote

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: MICROSOFT TECHNOLOGY LICENSING LLC

Free format text: FORMER OWNER: MICROSOFT CORP.

Effective date: 20150720

C41 Transfer of patent application or patent right or utility model
TA01 Transfer of patent application right

Effective date of registration: 20150720

Address after: Washington State

Applicant after: Micro soft technique license Co., Ltd

Address before: Washington State

Applicant before: Microsoft Corp.

GR01 Patent grant
GR01 Patent grant